Your search for 13836 returns 5007 document(s) |
Using Hard-held Technology To Enhance Teaching and Learning of Mathematics (447-456) |
Author: Kwee Tiow Choo; | Call Number: SEM-351 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Redefining IT career paths for the new millennium, page 16 |
Author: John Edwards | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using Asset Specificity and Asset Scope to Measure the Value of IT |
Author: John Tillquist, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Taxonomy Construction Using Compound Similarity Measure (915-932) |
Author: Mahmod Neshati
Leila Sharif Hassanabadi; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A transport-level proxy for secure multimedia streams, page 57 |
Author: King P.F. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Content management: cara mudah mengelola dokumen, page 57 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Statistical edge detection: learning and evaluating edge cues, page 57 |
Author: S. Konishi | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Finding perceptually closed paths in sketches and drwings, page 475 |
Author: E. Saund | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Create three distinct career paths for innovators, page 78 |
Author: Gina Colarelli O'Connor, Andrew Corbett, and Ron Pierantozzi | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How ethics can enhance organizational privacy: lessons from the choicePoint and TJX data breaches, page 673-687 |
Author: Mary J. Culnan and Cynthia Clark Williams | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|